Teraoka, Fumio

写真a

Affiliation

Faculty of Science and Technology, Department of Information and Computer Science (Yagami)

Position

Professor

Related Websites

External Links

Career 【 Display / hide

  • 1984.04
    -
    1988.02

    キヤノン株式会社

  • 1988.04
    -
    2001.03

    株式会社ソニーコンピュータサイエンス研究所

  • 2001.04
    -
    Present

    大学教授(理工学部情報工学科)

  • 2001.10
    -
    2007.09

    理工学インフォメーションテクノロジーセンター所長

  • 2002.10
    -
    2003.09

    大学学生総合センター委員(矢上支部)

display all >>

Academic Background 【 Display / hide

  • 1982.03

    Keio University, Faculty of Engineering

    University, Graduated

  • 1984.03

    Keio University, Graduate School, Division of Engineering

    Graduate School, Completed, Master's course

Academic Degrees 【 Display / hide

  • 工学, Keio University, Dissertation, 1993.03

    A Study on Host Mobility in Wide Area Computer Networks

 

Research Areas 【 Display / hide

  • Informatics / Information network

Research Keywords 【 Display / hide

  • Internet, Distributed Systems

Research Themes 【 Display / hide

  • New Generation Network Architecture, 

    2007
    -
    Present

 

Books 【 Display / hide

  • Wireless IP and Building the Mobile Internet

    TERAOKA FUMIO, Artech House Publishers, 2003.01

    Scope: 415-439

  • ワイヤレスLANアーキテクチャ

    TERAOKA FUMIO, 共立出版, 1996.06

    Scope: 73-108

Papers 【 Display / hide

  • GAMPALv2: An Anomaly Detection Mechanism for Internet Traffic by Predicting Flow Size Range from Time Features

    Taku Wakui, Fumio Teraoka, Takao Kondo

    IEICE Transactions on Information and Systems (電子情報通信学会)  E108-D ( 6 )  2025.06

    Research paper (scientific journal), Joint Work, Accepted

  • Detecting Inconsistency between Network Design and Current State Based on Network Ontology Bonsai

    Mori K., Kondo T., Teraoka F.

    Asian Internet Engineering Conference, AINTEC 2024    76 - 84 2024.08

     View Summary

    Generally, a network administrator designs, constructs, and operates an enterprise network. Since inconsistency between the network design understood by the administrator and the actual network configuration might arise due to mistakes or errors, a method for automatically detecting such inconsistency is needed. The following four techniques are necessary for this purpose. (i) A machine-readable notation to represent the network configuration. (ii) A tool to write down the network design using the machine-readable notation. (iii) A tool to automatically detect the current network configuration and write it down in the machine-readable notation. (iv) A tool to compare the two outputs generated in (ii) and (iii). This paper employs the network ontology called Bonsai for (i). Bonsai can represent not only physical configurations but also virtualization technologies such as VLAN and overlay. This paper proposes three tools, nc-design, nc-detect, and nc-diff for (ii)-(iv), and confirms that they work as expected in the test network. This paper also measures their fundamental performance.

  • Poster: A Container Orchestration Method Considering Shared Containers in an MEC Environment

    Atsushi Sekiguti, Takao Kondo, Kosuke Mori, Ken Kumakura, Liang Zhang, Fumio Teraoka

    MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services (ACM)     698 - 699 2024.06

    Research paper (international conference proceedings), Joint Work, Last author, Corresponding author, Accepted

     View Summary

    In a Multi-access Edge Computing (MEC) environment, an application will be composed of multiple containers running on edge servers, and a container orchestration method determines which containers should be deployed on which edge servers. This paper proposes a container orchestration method considering shared containers. These containers will be introduced in an MEC environment to reduce application resource usage, similar to a shared library in an operating system. The proposed method adopts a multi-stage grouping of edge servers to aggregate computation resource information and network information of the edge servers for efficient orchestration calculation. The formulation of the proposed orchestration method has been successfully completed, marking a significant milestone in this research. Evaluation will be conducted assuming an environment that contains 2,048 edge servers and 200 user terminals.

  • Poster: Secure NFV Infrastructure based on Software Fault Isolation Considering Multi-Tenant Environment

    Soki Koizumi, Takao Kodo, Fumio Teraoka

    MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services (ACM)     650 - 651 2024.06

    Research paper (international conference proceedings), Joint Work, Last author, Corresponding author, Accepted

     View Summary

    Network Function Virtualization Infrastructure (NFVI) enables the operation of Network Function Chaining (NFC) in a low-cost and flexible manner by realizing network functions as software on general-purpose servers. One of NFVI's security requirements is access control to packet buffers, which can be achieved using Intra-process Isolation techniques. This paper proposes a secure NFVI using Software Fault Isolation (SFI) for access control to packet buffers by inserting bounds check instructions before indirect memory access instructions. The measurement results show that the proposed method is faster than ERIM, another Intra-process isolation method based on domain switching.

  • Poster: Pub-Sub Based M2M System in an MEC Environment Considering Mobile Nodes as Compute Servers

    Haruto Takano, Rempei Sawada, Kosuke Mori, Fumio Teraoka

    MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services (ACM)     700 - 701 2024.06

    Research paper (international conference proceedings), Joint Work, Last author, Corresponding author, Accepted

     View Summary

    The number of IoT devices is increasing, but applications that utilize IoT devices and their data are still developing. One reason is the tight coupling between M2M infrastructure and applications and the difficulty of handling mobile devices in a unified manner. To address these challenges, we developed a versatile M2M system called "MECM2M"that utilizes the MEC paradigm. This paper proposes "MECM2Mv2"by adopting the Pub-Sub model and redesigning modules to improve the latency and efficiency, which were issues in MECM2M. Our future research evaluates the safety of using MECM2Mv2 in autonomous driving applications.

display all >>

Presentations 【 Display / hide

  • Constructing Network Slices with Locator/ID Split and Locator Division for 5G Core Network

    Kohei MatsuedaTakamasa OchiaiHiroaki TakanoRyota KimuraRyo SawaiTERAOKA FUMIO

    5th International Workshop on 5G Architecture (5GARCH) (Kansas City, MO, U.S.A.) , 

    2018.05

    Oral presentation (general), IEEE

  • MocLis: a Non-Tunneling Moving Cell Support Protocol Based on Locator/ID Split for 5G System

    Takamasa OchiaiKoei MatsuedaTakao KondoHiroaki TakanoRyota KimuraRyo SawaiTERAOKA FUMIO

    IEEE International Conference on Communications 2018 (ICC 2018) (Kansas City, MO, U.S.A.) , 

    2018.05

    IEEE

  • PTP Accuracy Measurement Comparison between Boundary Clock and VLAN Priority

    Koki HoritaShota ShiobaraTakao OkamawariFumio TeraokaKunitake Kaneko

    International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS 2017), 

    2017.09

    Oral presentation (general)

  • Separating Communication Policies and Mechanisms to Make Protocol Layering Clearer

    Hiroki WatanabeTakao KondoKunitake KanekoFumio Teraoka

    The 26th International Conference on Computer Communications and Networks (ICCCN 2017) (Vancouver, Canada) , 

    2017.07

    Oral presentation (general), IEEE

  • Layer-5 Temporally-Spliced Path for Efficient Disruption Tolerant Networking

    Daiki MitakeKunitake KanekoFumio Teraoka

    IEEE International Symposium on Local and Metropolitan Area Networks 2017 (LANMAN2017) (Osaka, Japan) , 

    2017.06

    Oral presentation (general), IEEE

display all >>

Intellectual Property Rights, etc. 【 Display / hide

  • ネットワーク構成検出装置、ネットワーク構成検出システム、ネットワーク構成検出方法及びネットワーク構成検出プログラム

    Date applied: 特願2017-136873  2017.07 

    Date announced: 特開2019-022007   

    Date issued: 特許 2017-136873(2017/07/13)  

    Patent, Joint

  • ストレージサーバ装置、ネットワーク情報共有システム、ネットワーク情報共有方法及びネットワーク情報共有プログラム

    Date applied: 特願2016-153376  2016.08 

    Date announced: 特開2018-023018  2018.02 

    Date issued: 特許 2016-153376(2016/08/04)  

    Patent, Joint

  • 通信装置、システム及び方法

    Date applied: 特願2015-148962  2015.07 

    Date announced: 特開2017-034305  2017.02 

    Date issued: 特許 2015-148962(2015/07/28)  

    Patent, Joint

  • 通信システム、通信制御方法、ノード装置及びプログラム

    Date applied: 特願2014-132479  2014.06 

    Date announced: 特開2016-12776  2016.01 

    Date issued:   2018.01

    Patent, Joint

  • 通信制御方法,通信システム,ノード装置,及びプログラム

    Date applied: 特願2013-115784  2013.05 

    Date announced: 特開2014-236321  2014.12 

    Date issued: 特許第5990492号  2016.08

    Patent, Joint

display all >>

Awards 【 Display / hide

  • 情報処理学会 平成12年度論文賞

    SHITAMA KAZUHIRO TERAOKA FUMIO, 2001.05, 情報処理学会, 移動指向ネットワークアーキテクチャの設計と実装

    Type of Award: Award from Japanese society, conference, symposium, etc.

  • 情報処理学会 平成12年度論文賞

    2001, 情報処理学会

  • 高橋奨励賞

    TERAOKA FUMIO, 1992.06, 日本ソフトウェア科学会, Virtual Internet Protocol の実装と評価

    Type of Award: Award from Japanese society, conference, symposium, etc.

  • 日本ソフトウェア科学会 高橋奨励賞

    1992, 日本ソフトウェア科学会

 

Courses Taught 【 Display / hide

  • RECITATION IN INFORMATION AND COMPUTER SCIENCE

    2024

  • NETWORK ENGINEERING 1 B

    2024

  • NETWORK ENGINEERING 1 A

    2024

  • LITERACY IN INFORMATION SECURITY MANAGEMENT B

    2024

  • LITERACY IN INFORMATION SECURITY MANAGEMENT A

    2024

display all >>

Courses Previously Taught 【 Display / hide

  • UNIX System Programming

    Keio University

    2013.04
    -
    2014.03

    Autumn Semester, Lecture, Within own faculty, 1h

  • Advanced Course on Network Engineering

    Keio University

    2013.04
    -
    2014.03

    Spring Semester, Lecture, 1h

  • Network Engineering I

    Keio University

    2013.04
    -
    2014.03

    Spring Semester, Lecture, Within own faculty, 1h

 

Memberships in Academic Societies 【 Display / hide

  • 情報処理学会, 

    1995
    -
    Present
  • 日本ソフトウェア科学会, 

    1991
    -
    2017
  • 電子情報通信学会

     
  • ACM

     
  • IEEE

     

Committee Experiences 【 Display / hide

  • 2017

    第34回大会委員長, 日本ソフトウェア科学会

  • 2015

    Technical Program Co-Chair, Asian Internet Engineering Conference 2015 (AINTEC2015), ACM

  • 2014.05
    -
    Present

    IEICE Transactions on Communications編集委員, 電子情報通信学会

  • 2014

    Technical Program Co-Chair, Asian Internet Engineering Conference 2014 (AINTEC2014), ACM

  • 2013

    Editor-in-Chief, Special Section on Internet Architectures, Protocols, and Management Methods that Enable Sustainable Development, IEICE Transactions on Communications, The Institute of Electronics, Information and Communication Engineering (IEICE)

display all >>